Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Computer Science
Data Analysis
Computer Networking
Medicine and the Arts: Humanising Healthcare
Exploring Play: The Importance of Play in Everyday Life
Songwriting: Writing the Lyrics
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore identity security, fraud prevention, and password management in the digital age. Learn practical tips for protecting personal information online.
Explore SSL/TLS encryption, its impact on network visibility, and the evolution to TLS 1.3. Learn about security implications and strategies for maintaining network oversight.
Explore threat hunting techniques in Office 365, focusing on audit logs, login patterns, and data exfiltration. Learn from a real-world compromise case study.
Explore AI's impact on cybersecurity, including advancements in threat detection, campaign hunting, and context-aware systems. Learn how AI is revolutionizing the field and enhancing accuracy.
Explore DevOps practices for implementing full route-to-live in SIEM platforms. Learn about threat detection, adaptive hunting, and version control for enhanced cybersecurity.
Explore advanced cybersecurity strategies, including zero-day initiatives, machine learning, and threat analysis, to enhance digital information exchange safety and combat evolving cyber threats.
Explore the safety and security challenges of human digital memories in the Internet of Things era, including data analytics, identity protection, and ethical considerations.
Explore security challenges in the Third Platform era, covering firewalls, DDoS attacks, and cloud computing. Learn strategies to protect networks in evolving technological landscapes.
Explore side-channel attacks on embedded devices, including techniques, history, and real-life examples. Learn about power analysis methods and their implications for cryptography.
Explore cutting-edge encryption methods, from RSA to quantum-robust algorithms, and their impact on cybersecurity. Learn about mathematical foundations and emerging technologies in cryptography.
Explore quantum technology's impact on cloud computing, covering verification, protocols, and secure multi-party computing with Prof Elham Kashefi.
Explore quantum computing principles, their impact on encryption, and cutting-edge developments in qubit technology. Gain insights into Shor's algorithm and its implications for cryptography.
Explore human-centered design, engagement strategies, and innovative approaches to mandatory training using big data and simulations for improved organizational outcomes.
Explore big data analytics, its importance, key controls, and potential pitfalls. Learn how to leverage data for insights and decision-making in various industries.
Explore the intersection of big data and cybersecurity, covering data management, visualization, and key drivers in this informative talk by David Stubley.
Get personalized course recommendations, track subjects and courses with reminders, and more.